7Block Labs
Blockchain

ByAUJay

Decentralized Identity Revolution: 7Block Labs’ Vision

In today’s digital world, our identities seem to be spread out all over the place, making it really challenging to keep track of who we are online. 7Block Labs is here to shake things up with a whole new way of handling digital identity. Their goal is all about decentralization, which means putting you back in charge of your personal info.

The Problem with Traditional Identity

Let’s be real: traditional identity systems are seriously behind the times. They’re heavily dependent on centralized services, making them a sitting duck for hackers and leaving your data in the hands of just a few big companies. Here are some of the major issues:

  • Privacy Concerns: A lot of times, your data gets scooped up and sold off without you even realizing it.
  • Security Risks: Those centralized databases? They’re like candy for cybercriminals, making them super tempting targets for attacks.
  • Inflexibility: Want to update your personal info? Good luck with that; it can be a real pain.

7Block Labs’ Solutions

7Block Labs is diving into these challenges with some really cool solutions. Their decentralized identity platform gives users the power to own and manage their own data. Check out what they’re bringing to the table:

  • Self-Sovereign Identity: Users get to take the reins on their personal info, choosing exactly what to share and who gets to see it.
  • Blockchain Technology: They use blockchain to keep identity data safe, unchangeable, and only within the user's reach.
  • Interoperability: Their system is made to mesh easily with the platforms we're already using, making it a breeze to slip into our everyday routines.

How It Works

So, how does everything fit together? Here’s a quick rundown:

  1. Data Ownership: You get to create your own digital identity and keep it safe on the blockchain.
  2. Verification: If you ever need to confirm your identity, you can share just the info you need without giving away the whole picture.
  3. Continuous Control: You’re in charge of your digital identity at all times and can take back access whenever you want.

The Future of Digital Identity

7Block Labs isn’t just talking the talk; they’re walking the walk when it comes to making decentralized identity a reality. Their belief? With the right tools and technology, we can all take back control of our digital lives.

If you’re interested in exploring their mission further, swing by their website and get involved in the push for a safer, more private online identity.


At the heart of it all, the decentralized identity revolution is really about putting power back into the hands of individuals. With 7Block Labs at the forefront, we could be heading towards a digital future that's not just more secure but also more empowering for everyone.

The specific technical headache your team is living with

  • Wow, your CIO just hit you with a huge request: “Make sure our apps can handle EUDI Wallet credentials and mDLs,” but keep Okta SSO running smoothly. Meanwhile, Risk is insisting on SOC2-compliant logs and the ability to revoke access on a big scale. On top of that, Product is all about implementing passkeys to dodge account takeovers, and Compliance is looking for everything to be in line with NIST 800-63-4 ASAP.
  • Reality check:

    • The W3C Verifiable Credentials Data Model v2.0 (VCDM 2.0), along with Data Integrity 1.0, JOSE/COSE security, and Bitstring Status List v1.0, are now officially recognized as W3C Recommendations. This means they’re not just concepts anymore--they’re the real deal! (w3.org)
    • Both OpenID for Verifiable Credential Issuance (OID4VCI 1.0) and OpenID for Verifiable Presentations (OID4VP 1.0) have hit the Final Specifications milestone. In simpler terms, OAuth-grade APIs are now your go-to tools for issuing and presenting VCs. (openid.net)
    • With EU eIDAS 2.0 on the horizon, every Member State needs to roll out an interoperable EUDI Wallet by 2026. Things are already in motion, so if you’re operating in the EU, you’d better be ready to collaborate. (consilium.europa.eu)
    • NIST SP 800-63-4 just got the green light (as of Aug 2025), and it’s giving the thumbs-up to subscriber-controlled wallets and synced authenticators (hello, passkeys!). (pages.nist.gov)
    • Passkeys are stealing the show: more than 15B accounts are ready to use them, and Microsoft is seeing about 1M passkeys registered every single day. Looks like your password woes are really becoming a bigger concern. (fidoalliance.org)
  • To add to the mix, KYC is still a hassle--it's super expensive and takes forever. According to some fresh data from Fenergo, between two-thirds and 70% of banks are actually losing clients because of those pesky onboarding delays. Plus, when it comes to individual KYC reviews for corporations, they often ring up a bill between $1.5K and $3K. (resources.fenergo.com)

The risk of doing nothing (or doing the wrong thing)

  • Missed deadlines and procurement friction:

    • If you're not specifically including OID4VCI/OID4VP and VCDM 2.0 in your RFPs, you could end up with solutions that just don’t work together. That’s a headache you definitely want to avoid! Trust me, you really don’t want to go through the hassle of re-platforming in a year, especially with the EU’s 2026 EUDI deadline looming. For more info, check it out here.
  • Compliance and SOC2 implications:

    • If you can’t manage revocation at scale in an auditable way, those "credentials" of yours are basically just PDFs. By using Bitstring Status Lists, you can simplify revocation checks. Instead of looking up each credential, you can handle it with compressed bitstrings (think 16 KB blocks, GZIP down to just a few hundred bytes). Trust me, auditors will definitely want to see how you’re tracking credential validity. You can find more info here.
    • NIST 800-63-4 is out now, and it’s got the latest on wallet/federation guidance and syncable authenticators. If you don’t get your enrollment and assurance processes in place now, you’ll likely have to deal with them later under the pressure of an audit. Check out the full details here.
  • Security and UX debt:

    • Attackers are still targeting phishable MFA--Microsoft recently reported a staggering 7,000 password attacks every single second! If you haven’t started looking into passkeys and WebAuthn L3, you might want to consider it. Otherwise, you could be facing a rise in account takeovers and cart abandonment. Check out more details here.
  • Budget risk:

    • If you have to re-collect KYC every time a user hops onto a new business app, it can really eat away at your OPEX in no time. Reusable VCs can help distribute those KYC costs across various journeys, but this only works if your issuance, presentation, and revocation processes are solid and meet the necessary standards. You can check out more details here.

7Block Labs’ SOC2-ready, standards-first methodology

We think it’s best to integrate decentralized identity directly into your current IAM rather than completely swapping it out. This approach helps you clearly measure your ROI and simplifies the procurement process.

Phase 0: Alignment and Controls (Week 0-1)

Deliverables:

  • Business and Compliance Mapping: We're taking a closer look at some important performance indicators (KPIs) like onboarding abandonment rates and the average KYC cycle. We're also mapping out SOC2 TSC, NIST 800-63-4 assurance targets, data retention policies, and incident response strategies.
  • RFP Language: Just to clarify, we need to ensure everyone's aligned on this. “Issuer and Verifier MUST support VCDM 2.0, JOSE/COSE and/or Data Integrity 1.0, Bitstring Status List 1.0, OID4VCI 1.0, OID4VP 1.0. Plus, wallet acceptance MUST include EUDI Wallet and ISO 18013-5/-7 mDL profiles when applicable.” You can take a closer look here.

How We Fit Your Stack:

  • We believe in seamless integration! Our approach involves working directly with your Okta, Azure AD, or Keycloak for SSO and SCIM--no workaround needed. (Just a heads up, Keycloak and Authlete are already on board with OID4VCI, so we’ll ensure your roadmap fits right in.) Check out more details here.

7Block Roles:

  • Meet our awesome team! We’ve got a Senior Protocol Engineer (OIDC/OAuth/OID4VC*), a ZK Engineer, an IAM Architect, and a Compliance Lead ready to tackle any challenge.

Phase 1: Issuance Track (Weeks 1-4)

  • Alright, let’s get an issuer set up that seamlessly fits into your KYC/KYB workflows:

    • Protocols: We’ll be tapping into the OID4VCI 1.0 issuance endpoints. When it comes to credential formats, we're talking about SD‑JWT VC for selective disclosure, as well as VCDM 2.0 with JOSE/COSE and/or Data Integrity. You can check out the details here.
    • Cryptography: We're planning to use Ed25519/ECDSA suites via W3C Data Integrity or JWT/COSE through JOSE, ensuring everything works smoothly with your HSM/KMS. For all the nitty-gritty, the details are right here.
    • Revocation: We’ll go with a Bitstring Status List publisher that can manage 16KB lists, utilizing GZIP compression. Plus, we’ll create privacy-preserving groups with up to 100k entries. You can find more info here.
    • Governance: Let's stick with Controlled Identifiers (CIDs) for key rotation and service endpoint discovery. This is a smart move to avoid DID method sprawl. Dive deeper here.
  • Output:

    • In the end, you’ll have a fully functional issuance API that's ready for production. Plus, it’ll come with audit logs that align perfectly with SOC2 evidence artifacts, tracking everything from access and changes to incidents and revocations.

Phase 2: Presentation & Wallet Acceptance (Weeks 3-6; Parallel)

Verifier Services:

  • We're excited to announce the launch of the OID4VP 1.0 verifier! It's got nonce/audience binding, and we’ve made sure it works smoothly with DC-API wherever necessary. For all the details, just click here.
  • Wallet Coverage:

    • We're zeroing in on EUDI Wallet acceptance in line with the EU's implementing regulations. We're making sure to set up registered relying party flows and are gearing up for some conformance testing. If you're curious to learn more about this, check it out here.
    • We're diving into ISO mDL (18013-5) for in-person verification and ISO 18013-7 for online verification. You can look forward to support for transport through BLE, NFC, and QR codes, all tailored to different platform SDKs. If you want to get into the nitty-gritty of the ISO standards, check them out here.

IAM Bridge:

  • We're putting together verified claims for OIDC/SAML entitlements and passing them along to downstream apps via SCIM--no need to duplicate any PII! We’ve pulled this off by using some solid patterns from Okta and AWS IAM Identity Center. If you’re curious to learn more, check out this link.

Phase 3: Authentication Hardening (Weeks 4-7)

  • Passkeys:

    • Let’s dive into getting FIDO2/WebAuthn up and running for all the key user journeys. This is going to help us improve sign-in success rates and reduce those pesky account takeover (ATO) incidents. What's really exciting is the massive industry backing--over 15 billion accounts can already use passkeys! And guess what? WebAuthn L3 is expected to get even better by 2026. If you want to read more about it, just check this out: (fidoalliance.org).
  • Policy:

    • We should definitely get on the same page with NIST 800-63-4 regarding those phishing-resistant authenticators and wallet-based federation stuff. Let’s refresh those AAL/IAL mappings and recovery flows so everything stays seamless and secure. Check out the details here: (pages.nist.gov).

Phase 4: ZK Privacy Where It Pays (Weeks 5-9; optional but high-leverage)

  • Private Attribute Proofs:

    • We’re diving into some exciting integrations with iden3/Polygon ID for zkSNARK-based predicate proofs. Imagine being able to verify things like “over 18” or “KYB passed,” whether you want to do it on-chain or off-chain. Just a quick note: Groth16 verification costs can really influence your choice about how to go about verifying stuff--on-chain or off-chain. For all the detailed info, check out the iden3 docs.
    • Here’s a quick tip: running a single Groth16 verify on Ethereum will typically set you back around 200k-250k gas, and you’ll also need to factor in about ~7k for each public input. If you play it smart, using aggregation or verification layers can help spread those costs out--it’s crucial for any on-chain gating. For some deeper insights, don’t miss out on 7blocklabs.
  • Sybil Resistance & Anonymous Gating:

    • We're exploring Semaphore/MACI patterns to ensure fair "one-per-person" access and to avoid any collusion in voting for our internal programs and partner portals. Plus, we're all about protecting your privacy by not gathering unnecessary Personally Identifiable Information (PII). For more info, take a look here: Semaphore Docs.

Phase 5: Procurement, Controls, and Scale-Out (Weeks 8-12)

  • SOC2 & Audit:

    • Your evidence kits are all set and perfectly aligned with the AICPA TSC (you know, security, availability, confidentiality). We've included revocation logs, issuance/presentation audit trails, key lifecycle management, and those useful incident hooks, all ready for your auditors. Take a peek here: (aicpa-cima.com).
  • SRE/DevOps:

    • Let’s dive into setting up some Service Level Objectives (SLOs) for our issuance and verification APIs. Also, remember to tackle those canary and chaos tests for the revocation endpoints. And we should definitely whip up some runbooks to make key rotation a breeze!
  • Handoff:

    • Buckle up for some training sessions with the IAM, Compliance, and App teams! We'll also share RFP templates and those handy internal “standard patterns” docs to make sure we’re all aligned.

Reference Architectures You Can Actually Ship

Verifier Microservice (Kubernetes or ECS)

  • Think of the OID4VP endpoint as your handy tool for managing redirects and cross-device QR codes. It comes equipped with nonce/aud verification, JOSE/COSE/JWS validators, a Status List cache, and a cool policy engine that maps claims to entitlements.

Issuer API

  • So, the OID4VCI token endpoint is really where the magic happens! It's protected by OAuth, so you can trust that your data is secure. We've got format adapters ready for SD-JWT VC and VCDM 2.0 Data Integrity, plus a Bitstring Status List publisher and lifecycle webhooks to help keep everything running smoothly.

Wallet Acceptance

  • Thinking about getting into wallet acceptance? You'll be diving into EUDI Wallet relying party registration and the DC-API profile. We've also got some slick ISO mDL reader flows set up for both onsite and remote situations, plus we're supporting BLE, NFC, and QR across all platform SDKs. For more info, check it out here.

IAM Bridge

  • When it comes to IAM, think of your OIDC/SAML integration as your go-to for SSO. SCIM comes in to fill your apps with claims-based entitlements while keeping personal data safe--no extra spreading out needed. If you want to explore this further, check it out here.

Optional On-Chain Verifier

  • If your situation calls for it, we can totally set up a simple verifier or EAS-based attestations that work well with on-chain composability (like dynamic discounts or whitelists) without compromising privacy. EAS is great for public attestations, but when it comes to anything with personally identifiable information (PII), it's best to go with VCs and off-chain proofs. You can find more details here.
  • OID4VCI/OID4VP in your stack:

    • Keycloak’s OID4VCI feature is all about keeping things running smoothly, and now Authlete is on board with OID4VCI too! This means you can avoid the headache of writing any custom protocol code. Take a peek at it on GitHub.
    • Media types and headers: When you're working on securing VCs with JOSE, don't forget to set typ/cty correctly (like vp-ld+jwt). And do yourself a favor--stay away from accepting alg:"none". You can dive into all the nitty-gritty details in the W3C JOSE/COSE Rec-track document here.
    • SD-JWT VC is really gaining momentum over at the IETF! We're rolling it out to allow selective disclosure without the fuss of JSON-LD processing, which can be super useful depending on how much risk you're willing to take. You can find more details here.
  • Revocation at scale:

    • Have a look at Bitstring Status List 1.0. Its default length is 131,072 bits (yep, that’s 16KB!), but it can shrink to just a few hundred bytes when you’re revoking lots of items sparsely. This means rotating the list every hour is super easy, and it won't throw a wrench in your mobile flows. You can dive deeper into it here.
  • mDL acceptance:

    • ISO 18013-5 is all about in-person device interactions (you know, like NFC, QR codes, and BLE), while 18013-7 takes things up a notch by allowing for remote presentations. If you're curious about the specific transports we can tap into for our pilot reader choices, MATTR’s verifier SDKs have got you covered. Check it out here.
  • Passkeys:

    • What’s on the horizon: FIDO is saying that we’ve hit a huge milestone with over 15 billion accounts now ready to use passkeys. Plus, Microsoft is seeing around a million new passkeys created every single day! It’s definitely smart to use passkeys for your logins, and linking verifiable presentations to the same device-bound key makes for an even more secure experience. You can dive into more details here.
  • Choosing the Right DID Method Without Getting Stuck:

    • For businesses, going with did:web or Controlled Identifiers (CIDs) is usually way more efficient than setting up your own DID network. Plus, it helps you keep things like key rotation and service endpoints under control. This way, you lighten your operational load and simplify audits. If you're considering long-lasting public identifiers, Sidetree/ION is a solid choice--just be ready to manage the nodes. Check it out here.

GTM and ROI -- How to Measure Success in 90 Days

We prioritize real results over just flashy presentations.

What We Measure in Pilots

Onboarding and KYC

  • We’ve noticed a significant 20-40% drop in the time it takes to make that first transaction by reusing previously issued VCs. We kept an eye on this through funnel analytics, and on top of that, we've made re-verification a breeze with SD-JWT selective disclosure.
  • When it comes to corporate KYC, we’re really minimizing the back-and-forth by reissuing attestations at the issuer level and referencing them with Status Lists. This strategy is backed by Fenergo’s cost bands, which reveal that companies are shelling out around $1.5K to $3K per review, especially in those high-value segments. (crowdfundinsider.com)

Authentication and Risk

  • We've seen a nice 20-30% increase in sign-in success rates for journeys using passkeys, and there's been a reduction in account takeover incidents too. These numbers are compared to benchmarks from the FIDO/Microsoft ecosystem. (fidoalliance.org)

Procurement and Compliance

  • Thanks to standardized logs and revocation events, the time it takes to gather SOC2 evidence has been significantly reduced. This includes logs from the Bitstring Status List publisher and the audit trails from issuance/presentation. (w3.org)

Risk Management and Procurement Checklists Included

Here’s a quick overview of the RFP clauses we’re sharing:

  • Must support VCDM 2.0, OID4VCI 1.0, OID4VP 1.0; JOSE/COSE and/or Data Integrity; Bitstring Status List v1.0.
  • Wallet acceptance: EUDI Wallet (as per the implementing regulations) and ISO 18013-5/-7 mDL wherever it’s relevant. (w3.org)
  • IAM integration: OIDC/SAML, SCIM 2.0, and the passkeys/WebAuthn L3 roadmap. (w3.org)
  • NIST 800-63-4 alignment for assurance and phishing-resistant authenticators. (pages.nist.gov)
  • Logging and SOC2 evidence requirements that are mapped to AICPA TSC. (aicpa-cima.com)

Why 7Block Labs

  • We're bringing together ZK technology and IAM with a practical delivery playbook that actually gets results. If you need custom verifiers or on-chain privacy solutions, our ZK team is ready to help you cut down on verification costs (think streamlining inputs and aggregation). We simplify everything back to IAM as a clear policy decision--no need to wade through complicated crypto terms. Check us out here: (7blocklabs.com)
  • Let’s dive right into the good stuff that’ll bring you the most bang for your buck, then we can broaden our focus:

    • Begin with wallet acceptance and passkeys on the tricky user flows you have.
    • Bring in issuer/SD-JWT VC for reusable KYC/KYB in your more expensive markets.
    • Incorporate privacy-preserving proofs for those situations where compliance requires you to “prove without revealing.”

Next Steps and How We Work with Your Teams

90-Day Pilot Scope:

  • We're planning to launch 2-3 verifier flows in production, all under feature flags for both web and mobile. On top of that, we'll be adding passkey sign-in to at least one key journey. We're also going to link the issuer API to a sandboxed KYC feed and implement revocation via the Bitstring Status List.

What You Get:

  • When you wrap this up, you’ll end up with a strong business case that lays out the differences in funnel metrics and costs. Plus, you’ll have an SOC2 evidence kit ready to go and a thorough scale-up roadmap that comes with RFP language that’s all set for procurement.

Optional Streams:

  • If you're up for it, we can dive into a few cool optional streams like the EUDI Wallet and an ISO mDL conformance test plan for locations in the EU. We could also check out ZK-based predicate proofs that focus on privacy-sensitive attributes, plus an on-chain verifier for those public or composable use cases.

Where Our Services Fit

If you're on the lookout for top-notch implementation support, you’re in the right place! Our custom blockchain development services and security hardening have got your back:

Appendix -- Emerging Best Practices We Apply by Default

  • Interop-first:

    • We're totally focused on VCDM 2.0 paired with JOSE/COSE for those JWT/COSE envelopes. If you're looking for LD semantics or BBS+ selective disclosure, we've got you covered with data integrity for JSON-LD as well. Plus, let's steer clear of being stuck in a specific format! Dive deeper into it here.
  • Revocation at Internet Scale:

    • We use a Bitstring Status List that updates regularly and is cached by CDNs with ETag/If-None-Match. When something happens on the issuer’s side, we send out invalidations to keep everything running smoothly. You can find more details here.
  • Wallet Acceptance Hardening:

    • Binding presentations to the RP nonce and audience is crucial for us. We’re also making it a requirement to encrypt responses for EUDI when possible, plus we’re testing out ISO 18013-7 remote flows behind feature flags. Curious to learn more? Check it out here.
  • Passkeys Done Right:

    • We put device-bound authenticators front and center for authentication. Our account recovery process is pretty solid, thanks to scoped, high-friction fallbacks. We’re also keeping an eye on sign-in success and ATO deltas. If you want to dive deeper into the world of passkeys, check it out here.
  • ZK Pragmatism:

    • We only use on-chain verification when it's absolutely necessary for composability; otherwise, we handle it off-chain and provide an attestation or verifiable credential. If we decide to go on-chain, we're budgeting around 200-250k gas per proof on BN254 Groth16. We're also focused on reducing public inputs and looking into aggregation options. You can check out more details here.
  • DID Minimalism:

    • Our preference is to stick with did:web or CIDs when it comes to enterprise identifiers. We’ll consider going with Sidetree/ION only when the perks of decentralization and independence really make it worth the extra operational effort. You can dive deeper into this here.

Closing

Decentralized identity has officially moved past the experimental stage. With the arrival of W3C VCDM 2.0, OpenID OID4VCI/OID4VP, the upcoming timelines for the EUDI Wallet, ISO mDL remote presentation, and NIST 800‑63‑4, we now have the standards we need, and they’re all set for production.

As we look toward 2026, the teams that are likely to excel will be the ones that make the most of these frameworks. They're going to cut down on KYC rework, streamline onboarding, and gradually move away from passwords--without compromising on SOC2, SSO, or procurement.

CTA for Enterprise: Schedule Your 90-Day Pilot Strategy Call

Ready to elevate your enterprise? Let’s connect! Schedule a 90-day pilot strategy call with us. We’ll explore your goals and create a personalized game plan to set you up for success.

Like what you're reading? Let's build together.

Get a free 30-minute consultation with our engineering team.

7BlockLabs

Full-stack blockchain product studio: DeFi, dApps, audits, integrations.

7Block Labs is a trading name of JAYANTH TECHNOLOGIES LIMITED.

Registered in England and Wales (Company No. 16589283).

Registered Office address: Office 13536, 182-184 High Street North, East Ham, London, E6 2JA.

© 2026 7BlockLabs. All rights reserved.